74 research outputs found

    POISED: Spotting Twitter Spam Off the Beaten Paths

    Get PDF
    Cybercriminals have found in online social networks a propitious medium to spread spam and malicious content. Existing techniques for detecting spam include predicting the trustworthiness of accounts and analyzing the content of these messages. However, advanced attackers can still successfully evade these defenses. Online social networks bring people who have personal connections or share common interests to form communities. In this paper, we first show that users within a networked community share some topics of interest. Moreover, content shared on these social network tend to propagate according to the interests of people. Dissemination paths may emerge where some communities post similar messages, based on the interests of those communities. Spam and other malicious content, on the other hand, follow different spreading patterns. In this paper, we follow this insight and present POISED, a system that leverages the differences in propagation between benign and malicious messages on social networks to identify spam and other unwanted content. We test our system on a dataset of 1.3M tweets collected from 64K users, and we show that our approach is effective in detecting malicious messages, reaching 91% precision and 93% recall. We also show that POISED's detection is more comprehensive than previous systems, by comparing it to three state-of-the-art spam detection systems that have been proposed by the research community in the past. POISED significantly outperforms each of these systems. Moreover, through simulations, we show how POISED is effective in the early detection of spam messages and how it is resilient against two well-known adversarial machine learning attacks

    Problematic internet use among high school students: Prevalence, associated factors and gender differences

    Get PDF
    This study aimed to measure the prevalence of Problematic Internet Use (PIU) among high school students and to identify factors associated with PIU underlining gender differences. The students filled a self-administered, anonymous questionnaire collecting information on demographic characteristics and patterns of Internet use. Multiple logistic regression analysis was performed to identify factors associated with PIU in the overall sample and by gender. Twenty-five schools and 2022 students participated in the survey. Prevalence of PIU was 14.2% among males and 10.1% among females. Males 15-year-olds and females 14-year-olds had the highest PIU prevalence that progressively lowered with age among females. Only 13.5% of pupils declared parents controlled their Internet use. The sensation of feeling lonely, the frequency of use, the number of hours of connection, and visiting pornographic websites were associated with the risk of PIU in both genders. Attending vocational schools, the activities of chatting and file downloading, and the location of use at Internet point among males, and younger age among females were associated with PIU, whilst information searching was protective among females. PIU could become a public health problem in the next years. The physical and mental health consequences should be studied

    Image-guided thermal ablation of central renal tumors with retrograde cold pyeloperfusion technique: a monocentric experience

    Get PDF
    Purpose: To evaluate feasibility, safety and efficacy of image-guided thermal ablations associated with retrograde pyeloperfusion in patients with centrally located renal tumors. Materials and methods: 48 patients (15 women, 33 men, mean age 69.1 ± 11.8) were treated with image-guided thermal ablation associated with pyeloperfusion for 58 centrally located renal tumors (mean diameter 32.3 ± 7.32 mm). 7 patients had a single kidney. Microwave and radiofrequency ablation were used. All treatments were performed with ultrasound, CT, or fusion imaging guidance under general anesthesia and simultaneous retrograde cold pyeloperfusion technique. Results: Procedure was feasible in all cases. Technical success and primary technical efficacy were reached in 51/58 (88%) and 45/54 tumors (83%). With a second ablation performed in 5 tumors, secondary technical efficacy was achieved in 50/50 (100%) tumors. Minor and major complications occurred in 8/58 (13%) and 5/58 (8%) tumors. No significative change in renal function occurred after treatment. During follow-up, 5 recurrences occurred, that were retreated with a second ablation. At last follow up (mean 32.2 ± 22.0 months), 41/48 (85%) treated patients were free from disease. The median TTP and PFS were 27.0 (range, 2.3–80.0) and 26.5 months (range, 2.3–80.0), respectively. Conclusion: Image-guided thermal ablation associated with protective pyeloperfusion is a feasible, safe, and effective treatment option for patients with central renal tumors with a minimal impact on renal function and relevant potential to avoid nephrectomy

    Real-Time US-CT fusion imaging for guidance of thermal ablation in of renal tumors invisible or poorly visible with US: results in 97 cases

    Get PDF
    Purpose To assess the capability of ultrasound-computed tomography (US-CT) fusion imaging to guide a precise targeting of renal tumors invisible or poorly visible with US Materials and methods From 2016 renal tumors poorly visible or inconspicuous/invisible at US were treated at our institution with the guidance of US/CT fusion in a room equipped with CT scanner. Feasibility of the procedure, accuracy of targeting, complications, and technique efficacy were evaluated. Results Of 227 patients treated from 2016 to March 2020, 91 patients (65 males and 26 females, mean age 68.5 ± 10.1 years) with 97 renal lesions (mean maximum diameter 21.6 ± 9.4 mm) inconspicuous/invisible (29/97, 29.9%) or poorly visible (68/97, 70.1%) at US underwent treatment under US-CT fusion guidance. US-CT fusion imaging guidance was always technically feasible and enabled correct targeting in 97/97/(100%) of cases. Technical success was achieved in 93/97 lesions (95.9%). Three lesions were retreated during the same ablative session, while 1 was retreated in a subsequent session. Thus, primary efficacy was achieved in one session in 96/97 (98.9%) cases and secondary efficacy in 97/97 (100%) cases Conclusion US-CT image fusion guidance allows for a correct tumor targeting of renal tumors poorly visible or inconspicuous/invisible with US alone, with a high rate of technical success and technique efficacy

    The Importance of Mortality Risk Assessment: Validation of the Pediatric Index of Mortality 3 Score

    Get PDF
    Objective: To evaluate the performance of the newest version of the Pediatric Index of Mortality 3 score and compare it with the Pediatric Index of Mortality 2 in a multicenter national cohort of children admitted to PICU. Design: Retrospective, prospective cohort study. Setting: Seventeen Italian PICUs. Patients: All children 0 to 15 years old admitted in PICU from January 2010 to October 2014. Interventions: None. Measurement and main results: Eleven thousand one hundred nine children were enrolled in the study. The mean Pediatric Index of Mortality 2 and 3 values of 4.9 and 3.9, respectively, differed significantly (p < 0.05). Overall mortality rate was 3.9%, and the standardized mortality ratio was 0.80 for Pediatric Index of Mortality 2 and 0.98 for Pediatric Index of Mortality 3 (p < 0.05). The area under the curve of the receiver operating characteristic curves was similar for Pediatric Index of Mortality 2 and Pediatric Index of Mortality 3. The Hosmer-Lemeshow test was not significant for Pediatric Index of Mortality 3 (p = 0.21) but was highly significant for Pediatric Index of Mortality 2 (p < 0.001), which overestimated death mainly in high-risk categories. Conclusions: Mortality indices require validation in each country where it is used. The new Pediatric Index of Mortality 3 score performed well in an Italian population. Both calibration and discrimination were appropriate, and the score more accurately predicted the mortality risk than Pediatric Index of Mortality 2

    A Qualitative Exploration of the Use of Contraband Cell Phones in Secured Facilities

    Get PDF
    Offenders accepting contraband cell phones in secured facilities violate state corrections law, and the possession of these cell phones is a form of risk taking behavior. When offenders continue this risky behavior, it affects their decision making in other domains where they are challenging authorities; and may impact the length of their incarceration. This qualitative phenomenological study examined the lived experience of ex-offenders who had contraband cell phones in secured correctional facilities in order to better understand their reasons for taking risks with contraband cell phones. The theoretical foundation for this study was Trimpop\u27s risk-homeostasis and risk-motivation theories that suggest an individual\u27s behaviors adapt to negotiate between perceived risk and desired risk in order to achieve satisfaction. The research question explored beliefs and perceptions of ex-offenders who chose to accept the risk of using contraband cell phones during their time in secured facilities. Data were collected anonymously through recorded telephone interviews with 8 male adult ex-offenders and analyzed using thematic content analysis. Findings indicated participants felt empowered by possession of cell phones in prison, and it was an acceptable risk to stay connected to family out of concern for loved ones. The study contributes to social change by providing those justice system administrators, and prison managers responsible for prison cell phone policies with more detailed information about the motivations and perspectives of offenders in respect to using contraband cell phones while imprisoned in secured facilities

    Detecting spammers on social networks

    No full text
    Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, MySpace, or Twitter), storing and sharing a wealth of personal information. This information, as well as the possibility of contacting thousands of users, also attracts the interest of cybercriminals. For example, cybercriminals might exploit the implicit trust relationships between users in order to lure victims to malicious websites. As another example, cybercriminals might find personal information valuable for identity theft or to drive targeted spam campaigns. In this paper, we analyze to which extent spam has entered social networks. More precisely, we analyze how spammers who target social networking sites operate. To collect the data about spamming activity, we created a large and diverse set of “honey-profiles ” on three large social networking sites, and logged the kind of contacts and messages that they received. We then analyzed the collected data and identified anomalous behavior of users who contacted our profiles. Based on the analysis of this behavior, we developed techniques to detect spammers in social networks, and we aggregated their messages in large spam campaigns. Our results show that it is possible to automatically identify the accounts used by spammers, and our analysis was used for take-down efforts in a real-world social network. More precisely, during this study, we collaborated with Twitter and correctly detected and deleted 15,857 spam profiles. 1

    Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages

    No full text
    The web is one of the most popular vectors to spread malware. Attackers lure victims to visit compromised web pages or entice them to click on malicious links. These victims are redirected to sites that exploit their browsers or trick them into installing malicious software using social engineering. In this paper, we tackle the problem of detecting malicious web pages from a novel angle. Instead of looking at particular features of a (malicious) web page, we analyze how a large and diverse set of web browsers reach these pages. That is, we use the browsers of a collection of web users to record their interactions with websites, as well as the redirections they go through to reach their final destinations. We then aggregate the di↵erent redirection chains that lead to a specific web page and analyze the characteristics of the resulting redirection graph. As we will show, these characteristics can be used to detect malicious pages. We argue that our approach is less prone to evasion than previous systems, allows us to also detect scam pages that rely on social engineering rather than only those that exploit browser vulnerabilities, and can be implemented e ciently. We developed a system, called SpiderWeb, which implements our proposed approach. We show that this system works well in detecting web pages that deliver malware
    corecore